We have covered the astonishing diversity of conference badges to a great extent over the years, and we are always pleased and surprised at the creativity and ingenuity that goes into their creation. But the saddest thing about so many badges is that after the event they go into the drawer and are never touched again, such a missed opportunity!

It’s a trend that [Dan] has reversed though, with his rotary dial phone brought to life with an EMF Tilda MkIV. This was the badge from last year’s EMF Camp 2018, and its defining feature was a built-in GSM mobile phone. We didn’t give it a full review at the time because it has problems with the GSM part at the event and it would have been unfair to display what was an amazing badge in a negative light, but once we got it home it was straightforward enough to put a commercial SIM in the slot and use the public networks with it.

[Dan]’s phone is an Eastern European model that came to him through his grandfather. Inside it’s a relatively conventional design, into which he’s patched a couple of the Tilda’s I/O lines from the dial through a debounce circuit. But simply selecting a couple of lines wasn’t enough, as most of those on its expansion port come via a port expander. He needed inputs that could generate an interrupt, so he hijacked a couple from the on-board joystick. He’s included Python code which you can see in action in the video below. It’s important to note that he’s yet to hook up the audio to the badge so this is a work in progress, but it’s an interesting project nevertheless.

Leading edge computer security is veiled in secrecy — a world where novel attacks are sprung on those who do not yet know what they need to protect against. Once certain tactics have played out within cool kids’ circles, they are introduced to the rest of the world. An IBM red team presented what they’re calling “warshipping”: sending an adversarial network to you in a box.

Companies concerned about security have learned to protect their internet-accessible points of entry. Patrolling guards know to look for potential wardrivers parked near or repeatedly circling the grounds. But some are comparatively lax about their shipping & receiving, and they are the ideal targets for warshipping.

Bypassing internet firewalls and security perimeters, attack hardware is embedded inside a shipping box and delivered by any of the common carriers. Security guards may hassle a van bristling with antennas, but they’ll wave a FedEx truck right through! The hardware can be programmed to stay dormant through screening, waiting to probe once inside the walls.

The presentation described several ways to implement such an attack. There is nothing novel about the raw hardware – Raspberry Pi, GPS receiver, cellular modems, and such are standard fare for various projects on these pages. The creative part is the software and in how they are hidden: in packing material and in innocuous looking plush toys. Or for persistence, they can be hidden in a wall mounted plaque alongside some discreet photovoltaic panels. (Editor’s note: What? No Great Seals?)

With this particular technique out in the open, we’re sure others are already in use and will be disclosed some years down the line. In the meantime, we can focus our efforts on more benign applications of similar technology, whether it is spying on our cat or finding the nearest fast food joint. The hardware is evolving as well: a Raspberry Pi actually seems rather heavyweight for this, how about a compact PCB with both an ESP32 and a cellular modem?

As reported by ExtremeTech, the brand new 5G network is running into a major snag with mobile devices as Qualcomm 5G modems literally cannot handle the heat. After just a few minutes of use they’re going into thermal shutdown and falling back to measly 4G data rates. Reports by both PCMag and the Wall Street Journal (paywall) suggest that 5G-enabled phones consistently see problems when used in environments where temperatures hit or exceed 29.5 °C (85.1 °F).

The apparent cause is the increased power draw required by current 5G modems which make heavy use of beam forming and other advanced technologies to increase reception and perform processing on the received data. Unlike 4G and older technologies, 5G needs to have multiple antennas (three or more) to keep a signal, especially when you grab your shiny new smartphone with your millimeter-wave blocking hands.

The spin-off from all of this seems to be that perhaps 5G technology isn’t ready for prime-time, or that perhaps our phones need to have bigger batteries and liquid cooling to keep the 5G modem in it happy. Anyone up for modding a liquid cooling loop and (tiny) radiator into their phone?

In April of 2018, the Federal Emergency Management Agency sent out the very first “Presidential Alert”, a new class of emergency notification that could be pushed out in addition to the weather and missing child messages that most users were already familiar with. But while those other messages are localized in nature, Presidential Alerts are intended as a way for the Government to reach essentially every mobile phone in the country. But what if the next Presidential Alert that pops up on your phone was actually sent from somebody with a Software Defined Radio?

According to research recently released by a team from the University of Colorado Boulder, it’s not as far-fetched a scenario as you might think. In fact, given what they found about how the Commercial Mobile Alert Service (CMAS) works, there might not be a whole lot we can even do to prevent it. The system was designed to push out these messages in the most expedient and reliable way possible, which meant that niceties like authentication had to take a backseat.

The thirteen page report, which was presented at MobiSys 2019 in Seoul, details their findings on CMAS as well as their successful efforts to send spoofed Presidential Alerts to phones of various makes and models. The team used a BladeRF 2.0 and USRP B210 to perform their mock attacks, and even a commercially available LTE femtocell with modified software. Everything was performed within a Faraday cage to prevent fake messages from reaching the outside world.

So how does the attack work? To make a long story short, the team found that phones will accept CMAS messages even if they are not currently authenticated with a cell tower. So the first phase of the attack is to spoof a cell tower that provides a stronger signal than the real ones in the area; not very difficult in an enclosed space. When the phone sees the stronger “tower” it will attempt, but ultimately fail, to authenticate with it. After a few retries, it will give up and switch to a valid tower.

This negotiation takes around 45 seconds to complete, which gives the attacker a window of opportunity to send the fake alerts. The team says one CMAS message can be sent every 160 milliseconds, so there’s plenty of time to flood the victim’s phone with hundreds of unblockable phony messages.

The attack is possible because the system was intentionally designed to maximize the likelihood that users would receive the message. Rather than risk users missing a Presidential Alert because their phones were negotiating between different towers at the time, the decision was made to just push them through regardless. The paper concludes that one of the best ways to mitigate this attack would be to implement some kind of digital signature check in the phone’s operating system before the message gets displayed to the user. The phone might not be able to refuse the message itself, but it can at least ascertain it’s authentic before showing it to the user.

All of the team’s findings have been passed on to the appropriate Government agencies and manufacturers, but it will likely be some time before we find out what (if any) changes come from this research. Considering the cost of equipment that can spoof cell networks has dropped like a rock over the last few years, we’re hoping all the players can agree on a software fix before we start drowning in Presidential Spam.

The first LED digital wristwatches hit the market in the 1970s. They required a button push to turn the display on, prompting one comedian to quip that giving one to a one-armed man would be in poor taste. While the UIs of watches and other wearables have improved since then, smartphones still present some usability challenges. Some of the touch screen gestures needed to operate a phone, like pinching, are nigh impossible when one-handing the phone, and woe unto those with stubby thumbs when trying to take a selfie.

You’d think that the fleet of sensors and the raw computing power on board would afford better ways to control phones. And you’d be right, if the modular mechanical input widgets described in a paper from Columbia University catch on. Dubbed “Vidgets” by [Chang Xiao] et al, the haptic devices are designed to create characteristic acceleration profiles on a phone’s inertial measurement unit (IMU) when actuated. Vidgets take various forms, from push buttons to scroll wheels, each of a similar size and shape and designed to dock into one of eight positions on the back of a 3D-printed phone case. Once trained, the algorithm watches for the acceleration signature caused by actuating a Vidget, and sends commands to the phone to mimic the corresponding gestures. The video below demonstrates a couple of use cases, of which the virtual saxophone is our favorite.

Way back in the good old days, life ran at a slower pace. It took us almost a decade to get to the moon, and dialling the phone was a lazy affair which required the user to wait for the rotary mechanism to rewind after selecting each digit. Eager to bring a taste of retro telephony into the modern era, [Marek] retrofitted this vintage Polish telephone with a GSM upgrade.

The phone [Marek] salvaged had already been largely gutted, so there was little to lose in the transformation. A Motorola D15 GSM module was sourced from an alarm system to …read more

Radioactivity stirs up a lot of anxiety, partially because ionizing radiation is undetectable by any of the senses we were born with. Anytime radiation makes the news, there is a surge of people worried about their exposure levels and a lack of quick and accurate answers. Doctors are flooded with calls, detection devices become scarce, and fraudsters swoop in to make a quick buck. Recognizing the need for a better way, researchers are devising methods to measure cumulative exposure experienced by commodity surface mount resistors.

Cumulative exposure is typically tracked by wearing a dosimeter a.k.a. “radiation badge”. It is standard …read more

PostmarketOS began work on a real Linux distribution for Android phones just over 600 days ago. They recently blogged about the state of the project and ensured us that the project is definitely not dead.

PostmarketOS’ overarching goal remains a 10 year life-cycle for smartphones. We previously covered the project on Hackaday to give an introduction. Today, we’ll concern ourselves with the progress the PostmarketOS team has made.

The team admits that they’re stuck in the proof-of-concept phase, and need to break out of it. This has required foundational changes to the operating system to enable development across a wide …read more

Have you ever wished you could see in the RF part of the radio spectrum? While such a skill would probably make it hard to get a good night’s rest, it would at least allow you to instantly see dead spots in your WiFi coverage. Not a bad tradeoff.

Unwilling to go full [Geordi La Forge] to be able to visualize RF, [Ken Kawamoto] built the next best thing – an augmented-reality RF signal strength app for his smartphone. Built to aid in the repositioning of his router in the post-holiday cleanup, the app uses the Android ARCore framework to …read more

If adding a cell modem is dealing with a drama queen of a hardware component, then choosing from among the many types of modules available turns the designer into an electronics Goldilocks. There are endless options for packaging and features all designed to make your life easier (or not!) so you-the-designer needs to have a clear understanding of the forces at work to come to a reasonable decision. How else will Widget D’lux® finally ship? You are still working on Widget D’lux®, aren’t you?

OK, quick recap from last time. Cell modems can be used to add that great feature …read more

So you went to a tradeshow and heard about this cool new idea called the Internet Of Things; now it’s time to build an IoT product of your own. You know that to be IoT, your Widget D’lux® has to have a network connection but which to choose?

You could use WiFi or Bluetooth but that would be gauche. Maybe LoRaWAN? All the cool kids are using LoRa for medium or long range wireless these days, but that still requires a base station and Widget D’lux® will be a worldwide phenomenon. Or at least a phenomenon past your bedroom walls. …read more

With the latest and greatest 5G cellular networks right around the corner, it can be difficult to believe that it wasn’t so long ago that cell phones relied on analog networks. They aren’t used anymore, but it might only take a visit to a swap meet or flea market to get your hands on some of this vintage hardware. Of course these phones of a bygone era aren’t just impractical due to their monstrous size compared to modern gear, but because analog cell networks have long since gone the way of the floppy disk.

It’s hard to believe, but the Raspberry Pi has now been around long enough that some of the earliest Pi projects could nearly be considered bonafide vintage hacks at this point. A perfect example are some of the DIY Raspberry Pi smartphone projects that sprung up a few years back. Few of them were terribly practical to begin with, but even if you ignore the performance issues and bulkiness, the bigger problem is they relied on software and cellular hardware that simply isn’t going to cut it today.

Which was exactly the problem [Dylan Radcliffe] ran into when he wanted …read more

We’ve probably all got at least one old cell phone lurking somewhere around our bench. In most cases they’ll still work, but their batteries may be exhausted and their OS could be an ancient version. But sometimes there will be a phone that just died. One minute the flagship model, the next a useless slab of plastic and glass with the added annoyance of those priceless photos of Aunty May’s 80th forever locked in its memory.

[Andras Kabai] had just such a device land on his desk, a high-end Sony whose screen had gone blank. Others had tried, he was …read more

The high availability of (relatively) low cost modular components has made building hardware easier than ever. Depending on what you want to do, the hardware side of a project might be the hacker equivalent of building with LEGO. In fact, we wouldn’t be surprised if it literally involved building with LEGO. In any event, easy and quick hardware builds leave more time for developing creative software to run the show. The end result is that we’re starting to see very complex systems broken down into easy-to-replicate DIY builds that would have been nearly impossible just a few years ago.

If you haven’t been paying attention, live streaming has become a big business. Streamers are getting out of their basements and moving around among us. While IRL streams may not be our cup of tea, the technology behind creating a solid high upstream bandwidth wireless internet connection is. Sure you can stream with a phone, the top streamers want something a bit more reliable. Enter [Gunrun], who has designed a backpack just for mobile streaming.

The backpack starts with a Sony AS300 Camera. [Gunrun] likes this particular camera for its exceptional audio capabilities. Network connections are handled with no less …read more

Whether or not you personally like the concept of the AirPod Bluetooth headphones is irrelevant, as an Apple product one thing is certain: all the cool kids want them. That also means that plenty of overseas manufacturers are pumping out janky clones for a fraction of the price for those who are more about the Apple look than the Apple price tag. Are they any good? No, of course not. But that doesn’t mean you can’t do something interesting with them.

[Igor Kromin] took apart a pair of fake AirPods and was predictably underwhelmed. So much so that he didn’t …read more

The Electromagnetic Field 2018 hacker camp in the UK will have its own GSM phone network, and as we have already covered its badge will be a fully-functional GSM phone. This is as far as we are aware a first in the world of badges, and though it may not be a first in hacker camp connectivity it is still no mean achievement at the base station side. To find out more we talked to two of the people behind the network, on the radio side Lime Microsystems‘ [Andrew Back], and on the network side Nexmo‘s developer advocate, [Sam Machin]. …read more

As is always the case with a significant hacker camp, we’ve been awaiting the official badge announcement for the upcoming Electromagnetic Field 2018 hacker camp with huge interest. These badges, for readers who may have been on Mars for the past few years, are part of a lively scene of wearable electronics at hacker conferences and camps, and can usually be expected to sport a fully-fledged computer in their own right along with other special functionality.

The announcement of the 2018 badge, dubbed the TiLDA Mk4, does not disappoint. We’d been told that there would be an on-site GSM network …read more

We could watch cellphone teardown videos all day long. There’s something pleasing about seeing how everything is packed into such a small enclosure. From the connectors, to that insidious glue, to the minuscule screws, [Scotty Allen] has a real knack for giving us a great look at the teardown process. Take a look at his latest video which attempts to add wireless charging to an iPhone. I think there’s a lot to be said for superb lighting and a formidable camera, but part of this is framing the shots just right.

With mobile phones now ubiquitous for the masses in much of the world for over two decades, something a lot of readers will be familiar with is a drawer full of their past devices. Alongside the older smartphone you’ll have a couple of feature phones, and probably at the bottom a Nokia candybar or a Motorola flip phone. There have been various attempts over the years to make use of the computing power the more recent ones contain through using their smartphone operating systems, but the older devices remain relatively useless.

You probably don’t think much about charging your phone. Just find an outlet, plug it in, and wait a while. Can’t find a cable or wall wart? A rainbow of cheap, candy-colored options awaits you down at the brightly-lit corner drugstore.

This scenario couldn’t be further from reality in third world countries like Papua New Guinea, where people living in remote jungles have cell phone coverage, but have to charge their phones by hooking them up directly to cheap solar panels and old car batteries.

[Marius Taciuc] wants to change all of that. At the suggestion of his friend [Brian], …read more

We’re all used to battery booster packs containing a Li-ion or Li-poly cell and a little inverter circuit, they are a standard part of 21st century daily survival for those moments when smartphone battery lives don’t perform as advertised. But how many of us have considered what goes into them, and further how many of us have sought to produce the best one possible rather than a unit built at the lowest price?

It’s a course [Peter6960] has followed, producing a PCB that sits on the back of an 18650 cell holder. It follows the work of [GreatScott] in particular …read more

During the early years of cell phones, lifespan was mainly limited by hardware (buttons wearing out, dropping phones, or water damage), software is a primary reason that phones are replaced today. Upgrades are often prompted by dissatisfaction with a slow phone, or manufacturers simply stopping updates to phone software after a few years at best. [Oliver Smith] and the postmarketOS project are working to fix the update problem, and have begun making progress on loading custom software onto cellphone processors and controlling their cellular modems.

Since [Tom Nardi] introduced Hackaday readers to postmarketOS, the team has made progress on compiling …read more

What is more fun than plugging in your phone and coming back to find your battery on empty? Stepping on a LEGO block with bare feet or arriving hungry at a restaurant after closing probably qualify. [Alex Sidorenko] won’t clean your floors or order you a pizza, but he can help you understand why cheap chargers won’t always power expensive devices. He also shows how to build an adapter to make them work despite themselves.

The cheapest smart device chargers take electricity from your home or car and convert it to five volts of direct current. That voltage sits on …read more

Hackaday readers were stumbling over each other to send in a link about this Android cellphone inside of an Entertainment Weekly magazine. Thanks to all who sent it in, and keep them coming. We’d rather get too many tips than none at all! The first thing we should address is the discomfort you will feel [...]

[Sam] has been working on a cellphone controlled robot for a while now and with the launch of a few similar Kickstarter campaigns he thought it would be good to share his progress so far. [Sam]‘s robot is controlled by an Android device with the help of an IOIO dev board. This setup provides more [...]

This little device is a prototype cellphone based on the ATmega128 microcontroller (translated). It boasts a 2.4″ touchscreen display which serves as the keypad, and uses the SIM100S module which takes care of the GSM radio communications. But the hardware isn’t the only attractive part. Judging from the screen shots a fair amount of time went into building [...]

Here’s an interesting concept. Lets make a kit to build your own super simple cell phone. Thats basically what a group at the MIT media lab is proposing with this prototype. Consisting of an SM5100b GSM module and a 1.8″ 160×128 pixel LCD screen on a very basic board holding some buttons, this thing is [...]

[Script] is pretty lucky. One of the engineers who designed his cellphone included over-voltage protection in the circuit. Of course you probably wouldn’t know about this if there wasn’t a service schematic available. But a bit of searching around let him resurrect the fried USB segment of his Nokia N900. Now [Script] has been experimenting [...]

Someday you may be able to use your crotch or armpits to recharge that cellphone. Heck, maybe there won’t even be a battery, just a capacitor which gets its juice from Power Felt, a fabric that converts body heat to electricity. Now we mention the nether-regions because it’s funny, but also because it makes the most [...]

When you’re away from home and your cellphone runs out of juice it can be a real downer. Sure, you could find a store and buy a wall charger, but wouldn’t it be more fun to build your own battery booster without using tools? [Spiritplumber] did just that, popping into a Radio Shack for the parts, [...]

Medical-grade microscope photography for $20 might be a game changer in areas where medical services are unavailable. This particular hack uses an iPhone’s 2 megapixel camera, as well as a tiny glass marble, to magnify a sample to about 350 times its actual size. The two images seen on the left are red blood cells photographed [...]

Cable management can really be an eyesore, but a little creative camouflage and you can have a cellphone charging station that also serves as decoration. [Kitesurfer] wanted to use one of the cubbyholes in his new Ikea book shelf for charging but wasn’t keen on the rat’s nest of wires that would go along with [...]

We’re all familiar with IVRS systems that let you access information using a touch-tone telephone. [Achu Wilso] built his own version which uses a cellphone, microcontroller, and computer. The cellphone is monitored by an LM324 op-amp with an attached 555 timer chip. When a call comes in the voltage on the headphone output goes high, [...]

[Autuin] was worried about having desirable electronics stolen while on the road with his band. He didn’t want to take a laptop along on tour, but he didn’t want to be without his music either. To solve this problem, he built a music player inside of a cheap-looking radio. His write-up covers two different portable MP3 solutions, [...]

[J8g8j] has been playing around with an old cellphone. He wanted to control it using a microcontroller but since there’s 24 buttons he wasn’t thrilled about hooking up a couple dozen relays to do the switching. Instead, he managed to control all 24-buttons using just 6-pins of a microcontroller. The proof-of-concept video that he posted [...]

The polished quality of this hack isn’t quite there, but we love the ingenuity and exploration exhibited. [Paulie1982] shows us how to make an old cellphone work with the rays of the sun. You can see above that he’s added photovoltaic solar cells to the back case of what looks like an old smart phone. [...]

Here’s the scenario: you’re going to be traveling somewhere and you’ll be charged roaming fees if you use your cellphone. But there is free WiFi available in this place. You can save yourself money by leaving your SIM card at home and using a GSM-to-Skype bridge to take calls on your phone via WiFi. [Trax] [...]

Ever wanted to increase the battery performance in your wireless mouse? [Davetech] shows you the way with this guide for converting a mouse from AA to lithium batteries. We were delighted by his hack-tacular approach that seems to have a nice little work-around at each step in the process. He grinds down the plastic battery [...]

We still can’t figure out why a standard charging scheme hasn’t been developed for handheld devices (other than greed). Certainly we understand that many devices have different electrical needs as far as voltage and current are concerned, but we still long for the ability to use one charger for many different doodads. [Rupin] is trying [...]

[Mok Young Bacq] works on the weekends for mobile game monitoring service. He has three cellphones that he uses for work, and although you would think this means he could work from anywhere in the world, the roaming charges are a killer. His solution was to build an incredibly intricate machine that can use three [...]

Want to listen in on cellphone calls or intercept test messages? Well that’s a violation of someone else’s privacy so shame on you! But there are black-hats who want to do just that and it may not be quite as difficult as you think. This article sums up a method of using prepaid cellphones and [...]

[Neil] is driving this Siemens A60 LCD using a parallel port on his Linux box. He likes this module because it has an integrated LED back-light, controller IC, and the pads are large enough for a human to solder. He notes that the screen runs on 2.9V, which matches the forward voltage of the LEDs used [...]

When you start to think about the cellphone waste our society produces it can be quite daunting. How many cell phones have you had in recent years? Now multiply that by five billion cellphone subscribers. [Anthony Goh] and [Neil Mendoza] found something to do with a very minuscule portion of those left-overs; building interactive birds out of [...]

This is a custom back plate with induction charging circuitry that [Derek Hughes] build for his HTC HD2 cellphone. When we checked in with him last week he showed us how to add an inductive charger without voiding the warranty but it wasn’t very pretty because the stock back plate blocked the inductive field and [...]

[Derek Hughes] wanted to use inductive charging on his cellphone without voiding the warranty. He picked up a Pixi charging backplate meant for a Palm Pre and scavenged the coil and regulator circuitry from it. To make the electrical connection with his HTC HD2 he removed the mini-USB plug from a charging cable and connected it [...]

That title’s not really fair to [Evan], but he did write a cellphone tetris game that causes your handset to automatically telephone him if you win. He’s using two applications that we’re not very familiar with, Twilio and Tornado. The former handles control input from the cellphone via their simple API. The latter is a [...]

[Tom Lee] and his colleagues just moved to a new office. The doors are setup like a security checkpoint with electronic strikes and buttons on the inside to allow entry. The button simply completes a low-voltage circuit, activating the strike which made it quite easy to patch into. They build an interface board with a [...]

[Miguel A. Vallejo] wanted a portable spectrum analyzer for the 2.4GHz ISM band. No problem, there’s modules for that are easy to interface with a microcontroller and LCD screen. But carrying around a black project box doesn’t exactly scream ‘cool’ so he fit his spectrum analyzer inside of a cell phone. This made a lot [...]